Nist security models

Assignment Help Basic Computer Science
Reference no: EM131258949

NIST Security Models

The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or are decided on at a lower level will have a significant impact on the success or failure of the program.

For this Discussion, you will evaluate security models based on a specific organization and its business model. Review Chapter 3 of NIST SP800-50 in this unit's Learning Resources to gain a deeper understanding of the three security models.

The organization you base your security model evaluation on will be determined by the first letter of your last name as listed below:


Wal-Mart

A-C

Apple Computer

D-F

A small, "mom-and-pop," hardware store

G-I

The Kraft Group

J-L

The United Nations

M-O

The Louvre Museum

P-R

Walden University

S-U

Fiat Group Automobiles

V-Z

Post a 300- to 500-word evaluation of which of the security models defined in NIST SP800-50 you would recommend for your organization. Include in your evaluation a description of your assigned organization and a detailed explanation of your recommended security awareness model. Justify the model you recommended.   Include your research on the organization and explain any assumptions you made about the organization to come to this conclusion.

Reference no: EM131258949

Questions Cloud

Weaknesses of a security awareness program : A security plan is only as strong as the awareness program that introduces and illuminates it to the employees of an organization. In order to develop strong SAPs, you must develop a broad understanding of techniques and best practices for their d..
Identify different groups of users of financial statements : Identify six different groups of users of financial statements, who would be interested in this company (ensure that both internal and external users are fairly represented).
What role do parents or caregivers have in the conference : What strategies can you use to ensure that parents/caregivers feel welcome and comfortable at the beginning of the conference? What method can you use to summarize the student's progress?
What are your observations : Using the MATLAB instruction cond, find the condition numbers of Hilbert matrices for n = 4,5,...,12. Plot these condition numbers as a function of n using semilogy. What are your observations?
Nist security models : The design of a security awareness program depends on many factors. One important factor is how the organization will develop and distribute security information. Determining whether the strategies and implementation of an SAP are set centrally or..
Why did you include each of the 10 elements : Why did you include each of the 10 elements - Why is a code of ethics an important part of every business from an employer standpoint?
Write a short program to interpolate the hat function : Write a short program to interpolate the hat function of Example 13.3 by trigonometric polynomials for l = 2,4,8,16, and 32. Measure maximum absolute error on the mesh 0:.01*pi:2*pi and observe improvement that is only linear in l (or n = 2l -1).
Analyzing a security breach : Many types of systems are networked together, and the number of devices that are added to this network increases every year. You can set your home security alarm system using a smartphone app or use another mobile app to open your car door. With t..
Analyze the historical context of contextual teaching : Analyze the historical context of contextual teaching, including discussions, for at least four types of curriculum orientations. Select a rationale for the orientation(s) for your curriculum design.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe binary tree traversals

Describe binary tree traversals (inorder, postorder, preorder and level-order). Give examples of applications of these traversals.

  A desktop support technician for a law firm

A desktop support technician for a law firm with a group of ten legal secretaries

  What is the necessity of including idf in the weight

What is the necessity of including IDF in the weight of a term?

  What term refers to defensive programming

What term refers to defensive programming? Where can someone obtain programming tools? Identify at least two of these tools, giving a brief description of each.

  What factors appear to be influential

Verify that the eight runs correspond to a design. What is the alias structure?

  What changes would you make to the provided schema

What changes would you make to the provided schema

  Develop website and business systems

Mary has hired your small business, IT Business Services Consultants, to develop her website and business systems. Write a 2- to 3-page report for the client including the following: A description of the relationship between business processes and in..

  Identify the common targets of malware

Determine the best practices that should be implemented by the security department to help reduce the risks of malware introductions to the network. Propose what users and systems administrators should do when a potential infection has been suspec..

  Perform the normalization process to convert

Perform the normalization process to convert

  Write a program perform using mars - assembly language

Write a program which will perform the following " using MARS - Assembly language" a. Read in a string from the user b

  List the names and ids of managers for each department

You subsequently realize that updates to these relations are frequent. Because indexes incur a high overhead, can you think of a way to improve performance on these queries without using indexes?

  What multivariate procedures are suggest

In terms of your own research try to formulate a problem that appears suitable for multivariate analysis.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd